US20120236347A1 - Information processing apparatus, method for controlling information processing apparatus, and program - Google Patents

Information processing apparatus, method for controlling information processing apparatus, and program Download PDF

Info

Publication number
US20120236347A1
US20120236347A1 US13/418,249 US201213418249A US2012236347A1 US 20120236347 A1 US20120236347 A1 US 20120236347A1 US 201213418249 A US201213418249 A US 201213418249A US 2012236347 A1 US2012236347 A1 US 2012236347A1
Authority
US
United States
Prior art keywords
job
processing unit
input
unit
main body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/418,249
Other versions
US9030680B2 (en
Inventor
Yoshinobu Umeda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: UMEDA, YOSHINOBU
Publication of US20120236347A1 publication Critical patent/US20120236347A1/en
Application granted granted Critical
Publication of US9030680B2 publication Critical patent/US9030680B2/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1218Reducing or saving of used resources, e.g. avoiding waste of consumables or improving usage of hardware resources
    • G06F3/1221Reducing or saving of used resources, e.g. avoiding waste of consumables or improving usage of hardware resources with regard to power consumption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1229Printer resources management or printer maintenance, e.g. device status, power levels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1279Controller construction, e.g. aspects of the interface hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1211Improving printing performance
    • G06F3/1212Improving printing performance achieving reduced delay between job submission and print start
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Definitions

  • the present invention relates to an information processing apparatus, a method for controlling an information processing apparatus, and a program.
  • Some information processing apparatuses have a normal mode and a power saving mode as a power mode, and operate in either power mode according to a situation. For such information processing apparatuses, it is important to increase the time period for which the information processing apparatus can operate in the power saving mode as much as possible to keep power consumption low.
  • Japanese Patent Application Laid-Open No. 2006-270538 discusses an invention relating to an information processing apparatus constituted by an apparatus main body and a network interface card (NIC), and configured in such a manner that power is supplied to the apparatus main body and the NIC in the normal mode, while power is supplied only to the NIC but is not supplied to the apparatus main body in the power saving mode.
  • the NIC when a job is input during the power saving mode, the NIC performs proxy response processing, thereby maintaining the power saving mode of the information processing apparatus as long as possible.
  • the proxy response processing means that, when a job is input during the power saving mode and this job is not required to be directly processed by the apparatus main body, the NIC processes this job on behalf of the apparatus main body while maintaining the power saving mode of the information processing apparatus.
  • the information processing apparatus is transitioned from the power saving mode to the normal mode, thereby allowing the apparatus main body to directly process that job.
  • the NIC side should decrypt the job first, and then perform proxy response processing. In this case, it can take a long time to decrypt the entire job, which inevitably leads to a delay in execution of proxy response processing. This problem becomes more noticeable when the decrypting capability of the NIC side is lower than the decrypting capability of the apparatus main body side.
  • One aspect of the present invention is directed to enabling proxy response processing perform processing more quickly on an encrypted job.
  • an information processing apparatus includes a first processing unit and a second processing unit.
  • the information processing apparatus operates in a first power mode in which power is supplied to the first processing unit and the second processing unit, or in a second power mode in which power is not supplied to the first processing unit but is supplied to the second processing unit.
  • the information processing apparatus includes an input unit configured to, when the information processing apparatus operates in the second power mode, input a job, a decryption unit configured to, when the input unit inputs an encrypted job, decrypt a header of the encrypted job without decrypting a main body of the encrypted job, a determination unit configured to determine whether the second processing unit should perform proxy response processing based on the header of the job, and a control unit configured to, in a case where the determination unit determines that the second processing unit should perform the proxy response processing, perform control such that the second processing unit processes the job input by the input unit without causing the information processing apparatus to transition from the second power mode to the first power mode, and configured to, in a case where the determination unit determines that the second processing unit should not perform the proxy response processing, perform control such that the first processing unit processes the job input by the input unit after causing the information processing apparatus to transition from the second power mode to the first power mode.
  • FIG. 1 illustrates a system configuration
  • FIG. 2 is a block diagram illustrating the configuration of a multi-function peripheral (MFP) 2 .
  • MFP multi-function peripheral
  • FIG. 3 is a flowchart illustrating processing to be performed by the MFP 2 .
  • FIG. 4 is a flowchart illustrating the details of proxy response processing according to a first exemplary embodiment.
  • FIG. 5 illustrates a data structure of a job.
  • FIG. 6 is a table storing the correspondence relationship between job types and availability of the proxy response processing.
  • FIG. 7 is a flowchart illustrating the details of proxy response processing according to a second exemplary embodiment.
  • FIG. 8 is a flowchart illustrating the details of proxy response processing according to a third exemplary embodiment.
  • an information processing apparatus is embodied by an MFP by way of example, but the information processing apparatus may be embodied by an apparatus that is not an MFP. Further, in the following description, an NIC is provided within the MFP, but the NIC may be provided outside the MFP.
  • FIG. 1 illustrates a system configuration of the present exemplary embodiment.
  • a system includes a personal computer (PC) 1 , an MFP 2 , and a local area network (LAN) 3 .
  • the PC 1 generates a job, and then outputs the job to the MFP 2 .
  • the MFP 2 inputs a job from the PC 1 , and then processes the job.
  • the LAN 3 connects the PC 1 and the MFP 2 communicably to each other.
  • FIG. 2 is a block diagram illustrating the configuration of the MFP 2 .
  • the solid line indicates a data flow
  • the broken line indicates a power flow.
  • the MFP 2 includes an NIC 100 , an apparatus main body 200 , and a power source 300 .
  • the NIC 100 includes components from a LAN interface 101 to a system bus 107 .
  • the LAN interface 101 inputs data from and outputs data to the LAN 3 .
  • a central processing unit (CPU) 102 (second processing unit) is in charge of control of the entire NIC 100 . To realize this control, the CPU 102 reads out a program stored in a read only memory (ROM) 106 into a random access memory (RAM) 103 , and then executes the program.
  • the RAM 103 functions as, for example, a work area when the CPU 102 processes a job.
  • An input/output (I/O) interface 104 inputs data from and outputs data into the apparatus main body 200 .
  • a Mini Security Architecture for Internet Protocol (IP-Sec) 105 encrypts and decrypts data according to the IP-Sec method.
  • IP-Sec Internet Protocol
  • the present exemplary embodiment will be described assuming that the Mini IP-Sec 105 is a hardware apparatus, but the Mini IP-Sec 105 may be a program described as a software application, and may be realized when the CPU 102 executes the program.
  • the ROM 106 stores, for example, a program to be executed by the CPU 102 .
  • the system bus 107 connects the respective components of the NIC 100 to one another.
  • the apparatus main body 200 includes components from an I/O interface 201 to a system bus 210 .
  • the I/O interface 201 inputs data from and outputs data into the NIC 100 .
  • a CPU 202 (first processing unit) is in charge of control of the entire apparatus main body 200 . To realize this control, the CPU 202 reads out a program stored in a ROM 207 or a hard disc drive (HDD) 204 into a RAM 203 , and then executes the program.
  • a program stored in a ROM 207 or a hard disc drive (HDD) 204 into a RAM 203 , and then executes the program.
  • HDD hard disc drive
  • the RAM 203 functions as, for example, a work area when the CPU 202 processes a job.
  • the HDD 204 stores, for example, an operating system (OS) and an application program that the CPU 202 executes. Further, the HDD 204 can also hold image data input by the LAN interface 101 and a reading unit 208 , and this image data can be output according to a user's instruction.
  • a certain area in the storage area of the HDD 204 is designated to hold image data for a while, and this area is referred to as “BOX”. Further, the function of storing image data into the BOX or outputting image data selected by a user from the image data stored in the BOX is referred to as “BOX function”.
  • An operation unit 205 includes a display unit and an input unit.
  • the operation unit 205 provides an operation screen of the MFP 2 to a user with use of the display unit, and receives various kinds of operations that a user applies to the MFP 2 with use of the input unit.
  • a Full IP-Sec 206 encrypts and decrypts data according to the IP-Sec method.
  • the Full IP-Sec 2006 can encrypt and decrypt data more quickly than the Mini IP-Sec 105 does. Further, the Full-IP-Sec 206 consumes a larger amount of power than the Mini IP-Sec 105 . Further, the Full IP-Sec 206 supports a wider range of encryption and decryption methods than the Mini IP-Sec 105 .
  • the present exemplary embodiment will be described assuming that the Full IP-Sec 206 is a hardware apparatus, but the Full IP-Sec 206 may be a program described as a software application, and may be realized when the CPU 202 executes the program.
  • the ROM 207 stores, for example, a boot program to be executed by the CPU 202 .
  • the reading unit 208 reads a document to input image data and stores the image data into the RAM 203 .
  • a printing unit 209 prints data onto a sheet based on image data stored in the RAM 203 .
  • a system bus 210 connects the respective components of the apparatus main body 200 to one another.
  • a power source 300 supplies power to the NIC 100 and the apparatus main body 200 .
  • the power source 300 switches the operation mode of the MFP 2 between a normal mode and a power saving mode according to the control of the CPU 102 and the CPU 202 .
  • FIG. 3 is a flowchart illustrating the processing performed by the MFP 2 .
  • the processing illustrated in FIG. 3 is executed by the CPU 202 when the MFP 2 operates mainly in the normal mode.
  • the CPU 202 reads out the program stored in the HDD 204 into the RAM 203 to execute the program, so that the processing illustrated in FIG. 3 is realized.
  • step S 101 the CPU 202 activates the MFP 2 when the CPU 202 receives an instruction to turn the power on from a user via the operation unit 205 .
  • the MFP 2 starts operating in the normal mode.
  • the MFP 2 operates in any of a plurality of power modes. Examples of the plurality of power modes include the normal mode (first power mode) and the power saving mode (second power mode).
  • the normal mode is a power mode in which power is supplied to both the NIC 100 and the apparatus main body 200 .
  • the power saving mode is a power mode in which power consumption is low compared to the normal mode, and power is supplied to the NIC 100 but is not supplied to the apparatus main body 200 . Further, as the power saving mode, there may be a power mode in which power supply is stopped to only a part of the apparatus main body 200 (the operation unit 205 , the reading unit 208 , and the printing unit 209 ), and power supply is continued to the rest of the apparatus main body 200 .
  • the expression “power is not supplied” should be interpreted in abroad sense, and is intended to cover not only the condition that no power is supplied power, but also the condition that the supplied power is too low to allow execution of a normal operation.
  • step S 102 the CPU 202 determines whether a job is input via the I/O interface 201 . If a job is input (YES in step S 102 ), the processing proceeds to step S 103 . If no job is input (NO in step S 102 ), the processing proceeds to step S 107 .
  • step S 103 the CPU 202 determines whether the job input in step S 102 is encrypted. If the input job is encrypted (YES in step S 103 ), the processing proceeds to step S 104 . If the input job is not encrypted (NO in step S 103 ), the processing proceeds to step S 105 .
  • step S 104 the CPU 202 decrypts the job input in step S 102 by controlling the Full IP-Sec 206 .
  • the Full IP-Sec 206 entirely decrypts the input job.
  • the Full IP-Sec 206 partially decrypts the input job.
  • step S 105 the CPU 202 processes the job input in step S 102 .
  • the CPU 202 performs the processing according to the type of the input job.
  • step S 106 the CPU 202 determines whether the CPU 202 has received an instruction to turn the power off from the user via the operation unit 205 . If the CPU 202 has received an instruction to turn the power off from the user (YES in step S 106 ), the processing ends. If the CPU 202 has not received an instruction to turn the power off from the user (NO in step S 106 ), the processing proceeds to step S 102 .
  • step S 107 the CPU 202 determines whether a predetermined time has passed, maintaining such a state that no job is input via the LAN interface 101 .
  • step S 107 instead of making the above-described determination, the CPU 202 determines whether the CPU 202 has received an instruction to cause the MFP 207 to transit to the power saving mode from the user via the operation unit 205 . If the predetermined time has passed, maintaining such a state that no job is input (YES in step S 107 ), the processing proceeds to step S 108 . If the predetermined time has not passed, maintaining such a stat that no job is input (NO in step S 107 ), the processing proceeds to step S 102 .
  • step S 108 the CPU 202 controls the power source 300 to cause the MFP 2 transition from the normal mode to the power saving mode.
  • step S 109 during the power saving mode, the NIC 100 performs proxy response processing.
  • the proxy response processing means that the CPU 102 responds to a job on behalf of the CPU 202 while the MFP 2 is operating in the power saving mode. The details of step S 109 is described below with reference to FIG. 4 .
  • step S 110 the CPU 202 determines whether the CPU 202 has received an activation signal from the CPU 102 via the I/O interface 201 .
  • the activation signal is a signal transmitted from the CPU 102 to the CPU 202 , and a signal for causing the MFP 2 to transition from the power saving mode to the normal mode.
  • the CPU 102 controls the power source 300 , thereby arranging power to be supplied to at least the CPU 202 .
  • the CPU 202 determines whether the CPU 202 has received an instruction to cause the MFP 2 to transition to the normal mode from the user via the operation unit 205 .
  • step S 110 If the CPU 202 has received an activation signal from the CPU 102 (YES in step S 110 ), the processing proceeds to step S 111 . If the CPU 202 has not received an activation signal from the CPU 102 (NO in step S 110 ), the processing proceeds to step S 109 .
  • step S 111 the CPU 202 controls the power source 300 to cause the MFP 2 to transition from the power saving mode to the normal mode.
  • the processing of causing the MFP 2 to transition from the power saving mode to the normal mode includes, for example, the processing that the CPU 202 activates the respective components of the apparatus main body 202 .
  • FIG. 4 is a flowchart illustrating the details of the proxy response processing according to the first exemplary embodiment.
  • the processing illustrated in FIG. 4 is performed by the CPU 102 when the MFP 2 operates mainly in the power saving mode.
  • the CPU 102 reads out the program stored in the ROM 106 into the RAM 103 to execute the program, so that the processing illustrated in FIG. 4 is realized.
  • step S 201 the CPU 102 determines whether a job is input via the LAN interface 101 . If a job is input (YES in step S 201 ), the processing proceeds to step S 202 . If no job is input (NO in step S 201 ), the CPU 102 waits until a job is input.
  • step S 202 the CPU 102 determines whether the job input in step S 201 is encrypted. If the input job is encrypted (YES in step S 202 ), the processing proceeds to step S 203 . If the input job is not encrypted (NO in step S 202 ), the processing proceeds to step 209 .
  • step S 203 the CPU 102 controls the Mini IP-Sec 105 to decrypt the header of the job input in step S 201 .
  • the Mini IP-Sec 105 does not decrypt the main body of the job.
  • the header of the job is copied to the Mini IP-Sec 105 , which then decrypts this copy. Therefore, the original header of the job remains encrypted.
  • FIG. 5 illustrates a data structure of a job.
  • a job includes a header and a main body.
  • the header contains, for example, information indicating the type of the job, and the main body contains, for example, image data required to execute the job.
  • the header has a fixed data length, while the main body has a variable data length.
  • the Mini IP-Sec 105 decrypts data from the beginning of the job to the position corresponding to a predetermined data length, thereby decrypting the header of the job.
  • step S 204 the CPU 102 determines whether the job input in step S 201 is a job that the NIC 100 can respond to by proxy based on the information indicating the type of the job, which is contained in the header of the job decrypted in step S 203 . If the input job is a job that the NIC 100 can respond to by proxy (YES in step S 204 ), the processing proceeds to step S 205 . If the input job is not a job that the NIC 100 can respond to by proxy (NO in step S 204 ), the processing proceeds to step S 207 .
  • the MFP 2 can process a plurality of types of jobs.
  • Examples of the plurality of types of jobs include an apparatus status check, a network connection response, Page Description Language (PDL) printing, and BOX remote access.
  • the apparatus status check job is where the MFP 2 reports the current status of the MFP 2 (for example, presence or absence of an error, the remaining amount of toner, and the remaining amount of sheets) to the PC 1 in response to a request from the PC 1 .
  • the network connection response job is where the MFP 2 notifies the PC 1 that the MFP 2 is connected to the LAN 3 at that time in response to a request from the PC 1 .
  • the PDL printing job is where the MFP 2 controls the printing unit 209 to print data based on print data in the PDL format which is input from the PC 1 .
  • the BOX remote access job is where the BOX is accessed by a remote operation from the PC 1 .
  • Examples of jobs that remotely access the BOX include a job of storing image data into the BOX according to a remote operation from the PC 1 , and a job of printing data based on image data stored in the BOX according to a remote operation from the PC 1 .
  • FIG. 6 is a table indicating the correspondence relationship between job types and availability of proxy response processing. This table is stored in the ROM 106 , and can be used by the CPU 102 . For example, the apparatus status check and network connection response jobs can be processed without use of the components of the apparatus main body 200 , and thereby allow the NIC 100 to take care of them by proxy response processing.
  • the PDL printing and BOX remote access jobs cannot be processed without use of the components of the apparatus main body 200 , and thereby do not allow the NIC 100 to take care of them by proxy response processing.
  • the CPU 102 refers to the table illustrated in FIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that the NIC 100 can respond to by proxy response processing.
  • step S 205 the CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S 201 . At this time, the CPU 102 does not decrypt the header of the input job.
  • step S 206 the CPU 102 processes the job input in step S 201 .
  • the CPU 102 performs the processing according to the type of the input job based on the information indicating the job type which is contained in the job header decrypted in step S 203 . Further, at this time, the CPU 102 processes the input job with use of the data contained in the job main body decrypted in step S 205 .
  • step S 207 the CPU 102 transmits an activation signal to the CPU 202 via the I/O interface 104 .
  • step S 208 the CPU 102 transmits the job input in step S 201 to the apparatus main body 200 via the I/O interface 104 .
  • the CPU 102 does not overwrite the header and main body of the job with the decrypted data, and therefore both the header and main body of the job transmitted to the apparatus main body 200 are data remaining encrypted.
  • step S 209 the CPU 102 determines whether the job input in step S 201 is a job that the NIC 100 can respond to by proxy response processing based on the information indicating the job type contained in the header of the job input in step S 201 .
  • the CPU 102 also refers to the table illustrated in FIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that the NIC 100 can respond to by proxy response processing. If the input job is a job that the NIC 100 can respond to by proxy response processing (YES in step S 209 ), the processing proceeds to step S 210 . If the input job is not a job that the NIC 100 can respond to by proxy response processing (NO in step S 209 ), the processing proceeds to step S 211 .
  • step S 210 the CPU 102 processes the job input in step S 201 .
  • the CPU 102 performs the processing according to the type of the input job based on the information indicating the job type, which is contained in the header of the job input in step S 201 . Further, at this time, the CPU 102 processes the input job with use of the data contained in the main body of the job input in step S 201 .
  • step S 211 the CPU 102 transmits an activation signal to the CPU 202 via the I/O interface 104 .
  • step S 212 the CPU 102 transmits the job input in step S 201 to the apparatus main body 200 via the I/O interface 104 .
  • Step S 212 is performed after the CPU 202 has completed its activation in response to the activation signal. Further, in the job data transmitted to the apparatus main body 200 in step S 212 , both the header and main body are unencrypted data.
  • the NIC 100 when an encrypted job is input while the MFP 2 is operating in the power saving mode, the NIC 100 decrypts only the header of the job to determine availability of proxy response processing. As a result, the NIC 100 can perform proxy response processing on the encrypted job at a higher speed and with a lighter processing load, compared to the processing speed and load when the NIC 100 decrypts the entire job to determine availability of proxy response processing.
  • step S 208 the NIC 100 transmits a job containing both the header and main body remaining encrypted to the apparatus main body 200 .
  • step S 208 the NIC 100 transmits a job in which the header is decrypted and the main body remains encrypted, to the apparatus main body 200 .
  • the basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to FIGS. 1 to 6 , and therefore the description thereof will be omitted here.
  • FIG. 7 is a flowchart illustrating the details of the proxy response processing according to the second exemplary embodiment.
  • steps similar to those illustrated in FIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here.
  • a difference between FIG. 7 and FIG. 4 is the addition of step S 301 between step S 207 and step S 208 .
  • step S 301 the CPU 102 overwrites the header of the job input in step S 201 with the data decrypted in step S 203 .
  • step S 208 the CPU 102 outputs the job data with only the header thereof decrypted. Therefore, in step S 104 , the CPU 202 only has to decrypt the main body of the job.
  • the present exemplary embodiment may be configured in such a manner that overwriting the header of a job is performed only when the time required to cause the MFP 2 to transit from the power saving mode to the normal mode is longer than the time required to overwrite the header of the job.
  • the time required for the MFP 2 to transition from the power saving mode to the normal mode, and the time required to overwrite the header of the job are stored in advance or estimated each time.
  • the CPU 202 does not have to decrypt the header of the job after the MFP 2 transitions to the normal mode, so that the CPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment.
  • step S 208 the NIC 100 transmits a job with both the header and main body thereof remaining encrypted to the apparatus main body 200 .
  • step S 208 the NIC 100 transmits a job in which both the header and the main body are decrypted to the apparatus main body 200 .
  • the basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to FIGS. 1 to 6 , and therefore the description thereof will be omitted here.
  • FIG. 8 is a flowchart illustrating the details of the proxy response processing according to the third exemplary embodiment.
  • steps similar to those in FIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here.
  • a difference between FIG. 8 and FIG. 4 is the addition of steps S 401 and S 402 between steps S 207 and S 208 .
  • step S 401 the CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S 201 .
  • the main body of the job is copied to the Mini IP-Sec 105 , which then decrypts this copy. Therefore, the original main body of the job remains encrypted.
  • step S 402 the CPU 102 overwrites the header of the job input in step S 201 with the data decrypted in step S 203 , and overwrites the main body of the job input in step S 201 with the data decrypted in step S 401 .
  • step S 208 the CPU 102 outputs the job data with both the header and main body thereof decrypted. Therefore, in step S 104 , the CPU 202 does not have to decrypt the job.
  • the present exemplary embodiment may be configured in such a manner that decrypting and overwriting the main body of a job is performed only when the time required for the MFP 2 to transition from the power saving mode to the normal mode is longer than the time required to decrypt and overwrite the main body of the job.
  • the time required for the MFP 2 to transition from the power saving mode to the normal mode, and the time required to decrypt and overwrite the main body of the job are stored in advance or estimated each time.
  • the CPU 202 does not have to decrypt the header and main body of the job after the power mode of the MFP 2 is caused to transit to the normal mode, so that the CPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment.
  • aspects of the present invention can also be realized by a computer of a system or apparatus (or devices such as a CPU or MPU) that reads out and executes a program recorded on a memory device to perform the functions of the above-described embodiments, and by a method, the steps of which are performed by a computer of a system or apparatus by, for example, reading out and executing a program recorded on a memory device to perform the functions of the above-described embodiments.
  • the program is provided to the computer for example via a network or from a recording medium of various types serving as the memory device (e.g., computer-readable storage medium).
  • the system or apparatus, and the recording medium where the program is stored are included as being within the scope of the present invention.

Abstract

An information processing apparatus includes a control unit that, in a case where it is determined that proxy response processing should be performed, performs control such that an inputted job is processed without causing the information processing apparatus to transition from a second power mode to a first power mode, and, in a case where it is determined that proxy response processing should not be performed, performs control such that inputted job is processed after causing the information processing apparatus to transition from the second power mode to the first power mode.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to an information processing apparatus, a method for controlling an information processing apparatus, and a program.
  • 2. Description of the Related Art
  • Some information processing apparatuses have a normal mode and a power saving mode as a power mode, and operate in either power mode according to a situation. For such information processing apparatuses, it is important to increase the time period for which the information processing apparatus can operate in the power saving mode as much as possible to keep power consumption low.
  • Japanese Patent Application Laid-Open No. 2006-270538 discusses an invention relating to an information processing apparatus constituted by an apparatus main body and a network interface card (NIC), and configured in such a manner that power is supplied to the apparatus main body and the NIC in the normal mode, while power is supplied only to the NIC but is not supplied to the apparatus main body in the power saving mode. In this information processing apparatus, when a job is input during the power saving mode, the NIC performs proxy response processing, thereby maintaining the power saving mode of the information processing apparatus as long as possible.
  • The proxy response processing here means that, when a job is input during the power saving mode and this job is not required to be directly processed by the apparatus main body, the NIC processes this job on behalf of the apparatus main body while maintaining the power saving mode of the information processing apparatus. When a job is input during the power saving mode and this job is required to be directly processed by the apparatus main body, the information processing apparatus is transitioned from the power saving mode to the normal mode, thereby allowing the apparatus main body to directly process that job.
  • In recent years, it has become common to encrypt a job when the job is transmitted or received between a plurality of apparatuses for security reasons. If an encrypted job is input into and is processed by the information processing apparatus discussed in Japanese Patent Application Laid-Open No. 2006-270538, the following problem arises.
  • To apply proxy response processing to the encrypted job, the NIC side should decrypt the job first, and then perform proxy response processing. In this case, it can take a long time to decrypt the entire job, which inevitably leads to a delay in execution of proxy response processing. This problem becomes more noticeable when the decrypting capability of the NIC side is lower than the decrypting capability of the apparatus main body side.
  • SUMMARY OF THE INVENTION
  • One aspect of the present invention is directed to enabling proxy response processing perform processing more quickly on an encrypted job.
  • According to an aspect of the present invention, an information processing apparatus includes a first processing unit and a second processing unit. The information processing apparatus operates in a first power mode in which power is supplied to the first processing unit and the second processing unit, or in a second power mode in which power is not supplied to the first processing unit but is supplied to the second processing unit. The information processing apparatus includes an input unit configured to, when the information processing apparatus operates in the second power mode, input a job, a decryption unit configured to, when the input unit inputs an encrypted job, decrypt a header of the encrypted job without decrypting a main body of the encrypted job, a determination unit configured to determine whether the second processing unit should perform proxy response processing based on the header of the job, and a control unit configured to, in a case where the determination unit determines that the second processing unit should perform the proxy response processing, perform control such that the second processing unit processes the job input by the input unit without causing the information processing apparatus to transition from the second power mode to the first power mode, and configured to, in a case where the determination unit determines that the second processing unit should not perform the proxy response processing, perform control such that the first processing unit processes the job input by the input unit after causing the information processing apparatus to transition from the second power mode to the first power mode.
  • Further features and aspects of the present invention will become apparent from the following detailed description of exemplary embodiments with reference to the attached drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate exemplary embodiments, features, and aspects of the invention and, together with the description, serve to explain the principles of the invention.
  • FIG. 1 illustrates a system configuration.
  • FIG. 2 is a block diagram illustrating the configuration of a multi-function peripheral (MFP) 2.
  • FIG. 3 is a flowchart illustrating processing to be performed by the MFP 2.
  • FIG. 4 is a flowchart illustrating the details of proxy response processing according to a first exemplary embodiment.
  • FIG. 5 illustrates a data structure of a job.
  • FIG. 6 is a table storing the correspondence relationship between job types and availability of the proxy response processing.
  • FIG. 7 is a flowchart illustrating the details of proxy response processing according to a second exemplary embodiment.
  • FIG. 8 is a flowchart illustrating the details of proxy response processing according to a third exemplary embodiment.
  • DESCRIPTION OF THE EMBODIMENTS
  • Various exemplary embodiments, features, and aspects of the invention will be described in detail below with reference to the drawings.
  • In the following description, an information processing apparatus is embodied by an MFP by way of example, but the information processing apparatus may be embodied by an apparatus that is not an MFP. Further, in the following description, an NIC is provided within the MFP, but the NIC may be provided outside the MFP.
  • A first exemplary embodiment will be described. FIG. 1 illustrates a system configuration of the present exemplary embodiment.
  • A system includes a personal computer (PC) 1, an MFP 2, and a local area network (LAN) 3. The PC 1 generates a job, and then outputs the job to the MFP 2. The MFP 2 inputs a job from the PC 1, and then processes the job. The LAN 3 connects the PC 1 and the MFP 2 communicably to each other.
  • FIG. 2 is a block diagram illustrating the configuration of the MFP 2. In FIG. 2, the solid line indicates a data flow, and the broken line indicates a power flow.
  • The MFP 2 includes an NIC 100, an apparatus main body 200, and a power source 300. The NIC 100 includes components from a LAN interface 101 to a system bus 107. The LAN interface 101 inputs data from and outputs data to the LAN 3. A central processing unit (CPU) 102 (second processing unit) is in charge of control of the entire NIC 100. To realize this control, the CPU 102 reads out a program stored in a read only memory (ROM) 106 into a random access memory (RAM) 103, and then executes the program. The RAM 103 functions as, for example, a work area when the CPU 102 processes a job. An input/output (I/O) interface 104 inputs data from and outputs data into the apparatus main body 200.
  • A Mini Security Architecture for Internet Protocol (IP-Sec) 105 encrypts and decrypts data according to the IP-Sec method. The present exemplary embodiment will be described assuming that the Mini IP-Sec 105 is a hardware apparatus, but the Mini IP-Sec 105 may be a program described as a software application, and may be realized when the CPU 102 executes the program. The ROM 106 stores, for example, a program to be executed by the CPU 102. The system bus 107 connects the respective components of the NIC 100 to one another.
  • The apparatus main body 200 includes components from an I/O interface 201 to a system bus 210. The I/O interface 201 inputs data from and outputs data into the NIC 100. A CPU 202 (first processing unit) is in charge of control of the entire apparatus main body 200. To realize this control, the CPU 202 reads out a program stored in a ROM 207 or a hard disc drive (HDD) 204 into a RAM 203, and then executes the program.
  • The RAM 203 functions as, for example, a work area when the CPU 202 processes a job. The HDD 204 stores, for example, an operating system (OS) and an application program that the CPU 202 executes. Further, the HDD 204 can also hold image data input by the LAN interface 101 and a reading unit 208, and this image data can be output according to a user's instruction. A certain area in the storage area of the HDD 204 is designated to hold image data for a while, and this area is referred to as “BOX”. Further, the function of storing image data into the BOX or outputting image data selected by a user from the image data stored in the BOX is referred to as “BOX function”.
  • An operation unit 205 includes a display unit and an input unit. The operation unit 205 provides an operation screen of the MFP 2 to a user with use of the display unit, and receives various kinds of operations that a user applies to the MFP 2 with use of the input unit.
  • A Full IP-Sec 206 encrypts and decrypts data according to the IP-Sec method. The Full IP-Sec 2006 can encrypt and decrypt data more quickly than the Mini IP-Sec 105 does. Further, the Full-IP-Sec 206 consumes a larger amount of power than the Mini IP-Sec 105. Further, the Full IP-Sec 206 supports a wider range of encryption and decryption methods than the Mini IP-Sec 105.
  • The present exemplary embodiment will be described assuming that the Full IP-Sec 206 is a hardware apparatus, but the Full IP-Sec 206 may be a program described as a software application, and may be realized when the CPU 202 executes the program. The ROM 207 stores, for example, a boot program to be executed by the CPU 202.
  • The reading unit 208 reads a document to input image data and stores the image data into the RAM 203. A printing unit 209 prints data onto a sheet based on image data stored in the RAM 203.
  • A system bus 210 connects the respective components of the apparatus main body 200 to one another. A power source 300 supplies power to the NIC 100 and the apparatus main body 200. The power source 300 switches the operation mode of the MFP 2 between a normal mode and a power saving mode according to the control of the CPU 102 and the CPU 202.
  • FIG. 3 is a flowchart illustrating the processing performed by the MFP 2. The processing illustrated in FIG. 3 is executed by the CPU 202 when the MFP 2 operates mainly in the normal mode. The CPU 202 reads out the program stored in the HDD 204 into the RAM 203 to execute the program, so that the processing illustrated in FIG. 3 is realized.
  • First, in step S101, the CPU 202 activates the MFP 2 when the CPU 202 receives an instruction to turn the power on from a user via the operation unit 205. Upon completion of the activation, the MFP 2 starts operating in the normal mode. In the present exemplary embodiment, the MFP 2 operates in any of a plurality of power modes. Examples of the plurality of power modes include the normal mode (first power mode) and the power saving mode (second power mode). The normal mode is a power mode in which power is supplied to both the NIC 100 and the apparatus main body 200.
  • The power saving mode is a power mode in which power consumption is low compared to the normal mode, and power is supplied to the NIC 100 but is not supplied to the apparatus main body 200. Further, as the power saving mode, there may be a power mode in which power supply is stopped to only a part of the apparatus main body 200 (the operation unit 205, the reading unit 208, and the printing unit 209), and power supply is continued to the rest of the apparatus main body 200. In the present embodiment, the expression “power is not supplied” should be interpreted in abroad sense, and is intended to cover not only the condition that no power is supplied power, but also the condition that the supplied power is too low to allow execution of a normal operation.
  • Subsequently, in step S102, the CPU 202 determines whether a job is input via the I/O interface 201. If a job is input (YES in step S102), the processing proceeds to step S103. If no job is input (NO in step S102), the processing proceeds to step S107.
  • If the determination result is YES in step S102, in step S103, the CPU 202 determines whether the job input in step S102 is encrypted. If the input job is encrypted (YES in step S103), the processing proceeds to step S104. If the input job is not encrypted (NO in step S103), the processing proceeds to step S105.
  • Subsequently, in step S104, the CPU 202 decrypts the job input in step S102 by controlling the Full IP-Sec 206. For an input job entirely encrypted, the Full IP-Sec 206 entirely decrypts the input job. For an input job partially encrypted, the Full IP-Sec 206 partially decrypts the input job.
  • Subsequently, in step S105, the CPU 202 processes the job input in step S102. At this time, the CPU 202 performs the processing according to the type of the input job.
  • Subsequently, in step S106, the CPU 202 determines whether the CPU 202 has received an instruction to turn the power off from the user via the operation unit 205. If the CPU 202 has received an instruction to turn the power off from the user (YES in step S106), the processing ends. If the CPU 202 has not received an instruction to turn the power off from the user (NO in step S106), the processing proceeds to step S102.
  • If the determination result is NO in step S102, in step S107, the CPU 202 determines whether a predetermined time has passed, maintaining such a state that no job is input via the LAN interface 101. Alternatively, in step S107, instead of making the above-described determination, the CPU 202 determines whether the CPU 202 has received an instruction to cause the MFP 207 to transit to the power saving mode from the user via the operation unit 205. If the predetermined time has passed, maintaining such a state that no job is input (YES in step S107), the processing proceeds to step S108. If the predetermined time has not passed, maintaining such a stat that no job is input (NO in step S107), the processing proceeds to step S102.
  • Subsequently, in step S108, the CPU 202 controls the power source 300 to cause the MFP 2 transition from the normal mode to the power saving mode. In step S109, during the power saving mode, the NIC 100 performs proxy response processing. The proxy response processing means that the CPU 102 responds to a job on behalf of the CPU 202 while the MFP 2 is operating in the power saving mode. The details of step S109 is described below with reference to FIG. 4.
  • Subsequently, in step S110, the CPU 202 determines whether the CPU 202 has received an activation signal from the CPU 102 via the I/O interface 201. The activation signal is a signal transmitted from the CPU 102 to the CPU 202, and a signal for causing the MFP 2 to transition from the power saving mode to the normal mode. It should be noted that, immediately before the CPU 202 receives an activation signal, the CPU 102 controls the power source 300, thereby arranging power to be supplied to at least the CPU 202. Alternatively, in step S110, instead of making the above-described determination, the CPU 202 determines whether the CPU 202 has received an instruction to cause the MFP 2 to transition to the normal mode from the user via the operation unit 205. If the CPU 202 has received an activation signal from the CPU 102 (YES in step S110), the processing proceeds to step S111. If the CPU 202 has not received an activation signal from the CPU 102 (NO in step S110), the processing proceeds to step S109.
  • Subsequently, in step S111, the CPU 202 controls the power source 300 to cause the MFP 2 to transition from the power saving mode to the normal mode. The processing of causing the MFP 2 to transition from the power saving mode to the normal mode includes, for example, the processing that the CPU 202 activates the respective components of the apparatus main body 202.
  • FIG. 4 is a flowchart illustrating the details of the proxy response processing according to the first exemplary embodiment. The processing illustrated in FIG. 4 is performed by the CPU 102 when the MFP 2 operates mainly in the power saving mode. The CPU 102 reads out the program stored in the ROM 106 into the RAM 103 to execute the program, so that the processing illustrated in FIG. 4 is realized.
  • First, in step S201, the CPU 102 determines whether a job is input via the LAN interface 101. If a job is input (YES in step S201), the processing proceeds to step S202. If no job is input (NO in step S201), the CPU 102 waits until a job is input.
  • Subsequently, in step S202, the CPU 102 determines whether the job input in step S201 is encrypted. If the input job is encrypted (YES in step S202), the processing proceeds to step S203. If the input job is not encrypted (NO in step S202), the processing proceeds to step 209.
  • If the determination result is YES in step S202 in step S203, the CPU 102 controls the Mini IP-Sec 105 to decrypt the header of the job input in step S201. At this time, the Mini IP-Sec 105 does not decrypt the main body of the job. Further, at this time, the header of the job is copied to the Mini IP-Sec 105, which then decrypts this copy. Therefore, the original header of the job remains encrypted.
  • FIG. 5 illustrates a data structure of a job. A job includes a header and a main body. The header contains, for example, information indicating the type of the job, and the main body contains, for example, image data required to execute the job. The header has a fixed data length, while the main body has a variable data length. In step S203, the Mini IP-Sec 105 decrypts data from the beginning of the job to the position corresponding to a predetermined data length, thereby decrypting the header of the job.
  • Subsequently, in step S204, the CPU 102 determines whether the job input in step S201 is a job that the NIC 100 can respond to by proxy based on the information indicating the type of the job, which is contained in the header of the job decrypted in step S203. If the input job is a job that the NIC 100 can respond to by proxy (YES in step S204), the processing proceeds to step S205. If the input job is not a job that the NIC 100 can respond to by proxy (NO in step S204), the processing proceeds to step S207.
  • In the present exemplary embodiment, the MFP 2 can process a plurality of types of jobs. Examples of the plurality of types of jobs, especially, examples of jobs input from the PC 1 to the MFP 2, include an apparatus status check, a network connection response, Page Description Language (PDL) printing, and BOX remote access. The apparatus status check job is where the MFP 2 reports the current status of the MFP 2 (for example, presence or absence of an error, the remaining amount of toner, and the remaining amount of sheets) to the PC 1 in response to a request from the PC 1. The network connection response job is where the MFP 2 notifies the PC 1 that the MFP 2 is connected to the LAN 3 at that time in response to a request from the PC 1. The PDL printing job is where the MFP 2 controls the printing unit 209 to print data based on print data in the PDL format which is input from the PC 1.
  • The BOX remote access job is where the BOX is accessed by a remote operation from the PC 1. Examples of jobs that remotely access the BOX include a job of storing image data into the BOX according to a remote operation from the PC 1, and a job of printing data based on image data stored in the BOX according to a remote operation from the PC 1.
  • FIG. 6 is a table indicating the correspondence relationship between job types and availability of proxy response processing. This table is stored in the ROM 106, and can be used by the CPU 102. For example, the apparatus status check and network connection response jobs can be processed without use of the components of the apparatus main body 200, and thereby allow the NIC 100 to take care of them by proxy response processing.
  • Further, for example, the PDL printing and BOX remote access jobs cannot be processed without use of the components of the apparatus main body 200, and thereby do not allow the NIC 100 to take care of them by proxy response processing. In step S204, the CPU 102 refers to the table illustrated in FIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that the NIC 100 can respond to by proxy response processing.
  • If the determination result is YES in step S204, in step S205, the CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S201. At this time, the CPU 102 does not decrypt the header of the input job.
  • Subsequently, in step S206, the CPU 102 processes the job input in step S201. At this time, the CPU 102 performs the processing according to the type of the input job based on the information indicating the job type which is contained in the job header decrypted in step S203. Further, at this time, the CPU 102 processes the input job with use of the data contained in the job main body decrypted in step S205.
  • If the determination result is NO in step S204, in step S207, the CPU 102 transmits an activation signal to the CPU 202 via the I/O interface 104.
  • Subsequently, in step S208, the CPU 102 transmits the job input in step S201 to the apparatus main body 200 via the I/O interface 104. In the present exemplary embodiment, in step S208, the CPU 102 does not overwrite the header and main body of the job with the decrypted data, and therefore both the header and main body of the job transmitted to the apparatus main body 200 are data remaining encrypted.
  • If the determination result is NO in step S202, in step S209, the CPU 102 determines whether the job input in step S201 is a job that the NIC 100 can respond to by proxy response processing based on the information indicating the job type contained in the header of the job input in step S201. In step S209, the CPU 102 also refers to the table illustrated in FIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that the NIC 100 can respond to by proxy response processing. If the input job is a job that the NIC 100 can respond to by proxy response processing (YES in step S209), the processing proceeds to step S210. If the input job is not a job that the NIC 100 can respond to by proxy response processing (NO in step S209), the processing proceeds to step S211.
  • If the determination result is YES in step S209, in step S210, the CPU 102 processes the job input in step S201. At this time, the CPU 102 performs the processing according to the type of the input job based on the information indicating the job type, which is contained in the header of the job input in step S201. Further, at this time, the CPU 102 processes the input job with use of the data contained in the main body of the job input in step S201.
  • If the determination result is NO in step S209, in step S211, the CPU 102 transmits an activation signal to the CPU 202 via the I/O interface 104.
  • Subsequently, in step S212, the CPU 102 transmits the job input in step S201 to the apparatus main body 200 via the I/O interface 104. Step S212 is performed after the CPU 202 has completed its activation in response to the activation signal. Further, in the job data transmitted to the apparatus main body 200 in step S212, both the header and main body are unencrypted data.
  • According to the present exemplary embodiment, when an encrypted job is input while the MFP 2 is operating in the power saving mode, the NIC 100 decrypts only the header of the job to determine availability of proxy response processing. As a result, the NIC 100 can perform proxy response processing on the encrypted job at a higher speed and with a lighter processing load, compared to the processing speed and load when the NIC 100 decrypts the entire job to determine availability of proxy response processing.
  • A second exemplary embodiment will now be described. According to the first exemplary embodiment, in step S208, the NIC 100 transmits a job containing both the header and main body remaining encrypted to the apparatus main body 200.
  • According to the second exemplary embodiment, in step S208, the NIC 100 transmits a job in which the header is decrypted and the main body remains encrypted, to the apparatus main body 200.
  • The basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to FIGS. 1 to 6, and therefore the description thereof will be omitted here.
  • FIG. 7 is a flowchart illustrating the details of the proxy response processing according to the second exemplary embodiment. In FIG. 7, steps similar to those illustrated in FIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here. A difference between FIG. 7 and FIG. 4 is the addition of step S301 between step S207 and step S208. In step S301, the CPU 102 overwrites the header of the job input in step S201 with the data decrypted in step S203. As a result of the execution of step S301, in step S208, the CPU 102 outputs the job data with only the header thereof decrypted. Therefore, in step S104, the CPU 202 only has to decrypt the main body of the job.
  • Alternatively, the present exemplary embodiment may be configured in such a manner that overwriting the header of a job is performed only when the time required to cause the MFP 2 to transit from the power saving mode to the normal mode is longer than the time required to overwrite the header of the job. In this case, the time required for the MFP 2 to transition from the power saving mode to the normal mode, and the time required to overwrite the header of the job are stored in advance or estimated each time.
  • According to the present exemplary embodiment, when an encrypted job is input while the MFP 2 is operating in the power saving mode, and the MFP 2 transitions to the normal mode, the job transmitted from the NIC 100 to the apparatus main body 200 already has a decrypted header. As a result, according to the present exemplary embodiment, the CPU 202 does not have to decrypt the header of the job after the MFP 2 transitions to the normal mode, so that the CPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment.
  • A third exemplary embodiment will now be described. According to the first exemplary embodiment, in step S208, the NIC 100 transmits a job with both the header and main body thereof remaining encrypted to the apparatus main body 200.
  • According to the third exemplary embodiment, in step S208, the NIC 100 transmits a job in which both the header and the main body are decrypted to the apparatus main body 200. The basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to FIGS. 1 to 6, and therefore the description thereof will be omitted here.
  • FIG. 8 is a flowchart illustrating the details of the proxy response processing according to the third exemplary embodiment. In FIG. 8, steps similar to those in FIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here. A difference between FIG. 8 and FIG. 4 is the addition of steps S401 and S402 between steps S207 and S208.
  • First, in step S401, the CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S201. At this time, the main body of the job is copied to the Mini IP-Sec 105, which then decrypts this copy. Therefore, the original main body of the job remains encrypted.
  • Subsequently, in step S402, the CPU 102 overwrites the header of the job input in step S201 with the data decrypted in step S203, and overwrites the main body of the job input in step S201 with the data decrypted in step S401. As a result of the execution of step S402, in step S208, the CPU 102 outputs the job data with both the header and main body thereof decrypted. Therefore, in step S104, the CPU 202 does not have to decrypt the job.
  • Alternatively, the present exemplary embodiment may be configured in such a manner that decrypting and overwriting the main body of a job is performed only when the time required for the MFP 2 to transition from the power saving mode to the normal mode is longer than the time required to decrypt and overwrite the main body of the job. In this case, the time required for the MFP 2 to transition from the power saving mode to the normal mode, and the time required to decrypt and overwrite the main body of the job are stored in advance or estimated each time.
  • According to the present exemplary embodiment, when an encrypted job is input while the MFP 2 is operating in the power saving mode, and the MFP 2 transitions to the normal mode, the job transmitted from the NIC 100 to the apparatus main body 200 already has a decrypted header and main body. As a result, according to the present exemplary embodiment, the CPU 202 does not have to decrypt the header and main body of the job after the power mode of the MFP 2 is caused to transit to the normal mode, so that the CPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment.
  • Aspects of the present invention can also be realized by a computer of a system or apparatus (or devices such as a CPU or MPU) that reads out and executes a program recorded on a memory device to perform the functions of the above-described embodiments, and by a method, the steps of which are performed by a computer of a system or apparatus by, for example, reading out and executing a program recorded on a memory device to perform the functions of the above-described embodiments. For this purpose, the program is provided to the computer for example via a network or from a recording medium of various types serving as the memory device (e.g., computer-readable storage medium). In such a case, the system or apparatus, and the recording medium where the program is stored, are included as being within the scope of the present invention.
  • While the present invention has been described with reference to exemplary embodiments, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all modifications, equivalent structures, and functions.
  • This application claims priority from Japanese Patent Application No. 2011-056603 filed Mar. 15, 2011, which is hereby incorporated by reference herein in its entirety.

Claims (7)

1. An information processing apparatus including a first processing unit and a second processing unit,
wherein the information processing apparatus operates in a first power mode in which power is supplied to the first processing unit and the second processing unit or in a second power mode in which power is not supplied to the first processing unit but is supplied to the second processing unit, the apparatus comprising:
an input unit configured to, when the information processing apparatus operates in the second power mode, input a job;
a decryption unit configured to, when the input unit inputs an encrypted job, to decrypt a header of the encrypted job without decrypting a main body of the encrypted job;
a determination unit configured to determine whether the second processing unit should perform proxy response processing based on the header of the job; and
a control unit configured to, in a case where the determination unit determines that the second processing unit should perform the proxy response processing, perform control such that the second processing unit processes the job input by the input unit without causing the information processing apparatus to transition from the second power mode to the first power mode, and configured to, in a case where the determination unit determines that the second processing unit should not perform the proxy response processing, perform control such that the first processing unit processes the job input by the input unit after causing the information processing apparatus to transition from the second power mode to the first power mode.
2. The information processing apparatus according to claim 1, wherein the control unit is configured to, in a case where the determination unit determines that the second processing unit should not perform the proxy response processing, transmit the job input by the input unit to the first processing unit, and
wherein the first processing unit is configured to process the job.
3. The information processing apparatus according to claim 2, wherein the control unit is configured to transmit the job to the first processing unit with the header and the main body thereof remaining encrypted, and
wherein the first processing unit is configured to decrypt the header and the main body to process the job.
4. The information processing apparatus according to claim 2, wherein the control unit is configured to transmit the job to the first processing unit with the header thereof decrypted and the main body thereof remaining encrypted, and
wherein the first processing unit is configured to decrypt the main body of the job without decrypting the header to process the job.
5. The information processing apparatus according to claim 2, wherein the control unit is configured to transmit to the first processing unit the job with the header and the main body thereof decrypted, and
wherein the first processing unit is configured to process the job without decrypting the header and the main body of the job.
6. A method for controlling an information processing apparatus including a first processing unit and a second processing unit, wherein the information processing apparatus operates in a first power mode in which power is supplied to the first processing unit and the second processing unit or in a second power mode in which power is not supplied to the first processing unit but is supplied to the second processing unit, the method comprising:
inputting, when the information processing apparatus operates in the second power mode, a job;
decrypting, when an encrypted job is input, a header of the encrypted job without decrypting a main body of the encrypted job;
determining whether the second processing unit should perform proxy response processing based on the header of the job; and
performing control, in a case where it is determined that the second processing unit should perform the proxy response processing, such that the second processing unit processes the inputted job without causing the information processing apparatus to transition from the second power mode to the first power mode, and performing control, in a case where it is determined that the second processing unit should not perform the proxy response processing, such that the first processing unit processes the inputted job after causing the information processing apparatus to transition from the second power mode to the first power mode.
7. A computer-readable storage medium storing a program for causing an information processing apparatus to implement the method of claim 6
US13/418,249 2011-03-15 2012-03-12 Information processing apparatus, method for controlling information processing apparatus, and program Expired - Fee Related US9030680B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2011056603A JP5818470B2 (en) 2011-03-15 2011-03-15 Information processing apparatus, information processing apparatus control method, and program
JP2011-056603 2011-03-15

Publications (2)

Publication Number Publication Date
US20120236347A1 true US20120236347A1 (en) 2012-09-20
US9030680B2 US9030680B2 (en) 2015-05-12

Family

ID=46828217

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/418,249 Expired - Fee Related US9030680B2 (en) 2011-03-15 2012-03-12 Information processing apparatus, method for controlling information processing apparatus, and program

Country Status (2)

Country Link
US (1) US9030680B2 (en)
JP (1) JP5818470B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140293342A1 (en) * 2013-04-01 2014-10-02 Kyocera Document Solutions Inc. Image processing system and image processing apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212886A1 (en) * 2002-05-09 2003-11-13 Nec Corporation Encryption/decryption system and encryption/decryption method
US20060101109A1 (en) * 2003-05-12 2006-05-11 Canon Kabushiki Kaisha Network service system, service proxy processing method, computer-readable storage medium storing program, and program therefor
US20080091736A1 (en) * 2006-10-13 2008-04-17 Konica Minolta Business Technologies, Inc. Data management system and data management method
US20100235619A1 (en) * 2009-03-13 2010-09-16 Canon Kabushiki Kaisha Image processing apparatus, communication system, control method thereof, and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6862583B1 (en) * 1999-10-04 2005-03-01 Canon Kabushiki Kaisha Authenticated secure printing
JP2006259906A (en) * 2005-03-15 2006-09-28 Ricoh Co Ltd Communication control device, communication control system, power saving control method, power saving control program and recording medium recording program
JP2006270538A (en) 2005-03-24 2006-10-05 Canon Inc Network device, recovery method from power saving state, and recording medium
JP2007036834A (en) * 2005-07-28 2007-02-08 Canon Inc Encryption apparatus, program, recording medium, and method
JP5377009B2 (en) * 2009-03-13 2013-12-25 キヤノン株式会社 Information processing apparatus, communication system, information processing apparatus control method, and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212886A1 (en) * 2002-05-09 2003-11-13 Nec Corporation Encryption/decryption system and encryption/decryption method
US20060101109A1 (en) * 2003-05-12 2006-05-11 Canon Kabushiki Kaisha Network service system, service proxy processing method, computer-readable storage medium storing program, and program therefor
US20080091736A1 (en) * 2006-10-13 2008-04-17 Konica Minolta Business Technologies, Inc. Data management system and data management method
US20100235619A1 (en) * 2009-03-13 2010-09-16 Canon Kabushiki Kaisha Image processing apparatus, communication system, control method thereof, and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140293342A1 (en) * 2013-04-01 2014-10-02 Kyocera Document Solutions Inc. Image processing system and image processing apparatus
US8958087B2 (en) * 2013-04-01 2015-02-17 Kyocera Document Solutions Inc. Image processing system and image processing apparatus

Also Published As

Publication number Publication date
JP2012192554A (en) 2012-10-11
JP5818470B2 (en) 2015-11-18
US9030680B2 (en) 2015-05-12

Similar Documents

Publication Publication Date Title
US8949641B2 (en) Information processing apparatus and method for controlling information processing apparatus restoration order of images that reduces the waiting time when restoration from a hibernation state
US8893305B2 (en) Access restricted file and access restricted file creating
JP2008210106A (en) Print processing execution device, history information processing method, program and recording medium
JP6440630B2 (en) Image forming method
JP2008030287A (en) Printing apparatus, printing system and program
US8390848B2 (en) Information processing apparatus and secured printing system for preventing a data leakage
US9042547B2 (en) Image forming apparatus
JP2009253810A (en) Image processing device, and method for controlling image processing device
JP2013165343A (en) Image forming device, image forming method, and program
JP5760441B2 (en) Printing control program, information processing apparatus, printing system, and printing apparatus
JP2008238676A (en) Image forming system, setting information managing program, and recording medium
JP2009025928A (en) Encrypted data processing method, encrypted data processing program, and encrypted data processor
JP4532937B2 (en) PRINT SYSTEM, ITS CONTROL METHOD, PRINT FUNCTION SPECIFICATION METHOD, COMPUTER DEVICE, COMPUTER PROGRAM, AND STORAGE MEDIUM
US9030680B2 (en) Information processing apparatus, method for controlling information processing apparatus, and program
JP5294795B2 (en) Print control apparatus, print control method, and computer program
JP6256417B2 (en) PRINT CONTROL DEVICE, PROGRAM, AND PRINT SYSTEM
JP2007317058A (en) Information processor
JP2011063027A (en) Network printer
JP2010097350A (en) Printing system, printer driver and printer
JP5239482B2 (en) Communication apparatus, program, and image forming apparatus
JPH0965148A (en) Picture processing system and picture output method
JP2012038076A (en) Information processing device, job processing system, job transmission path control method and program, and recording medium
JP2004336672A (en) Image output system, image data transmitting program, and image output apparatus
JP2009075451A (en) Image forming device
JP2013129092A (en) Image forming apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:UMEDA, YOSHINOBU;REEL/FRAME:028406/0123

Effective date: 20120228

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20190512